Prodesse Quam Conspici

Posts

Multiversion Concurrency Control
Lamport clock and vector clock
tricks of building queue with mysql
Optimistic Concurrency Control
transaction phenomena
group signature
secret sharing and secure multiparty computation
WiscKey Separating Keys from Values in SSD-conscious Storage
Shamir's secret sharing scheme
padding oracle attack
Identity based cryptography
pairing-based cryptography
Yao's millionaire problem
oblivious transfer
private set intersection based on rsa blind signature
blind signature
password authentication with insecure communication
Diffie-Hellman key size
timestamp-based concurrency control
commutative encryption
bitcask
Bigtable
md5
authenticated encryption
operation modes of block cipher
asserts in C++
Elgamal
RSA
Attack models in cryptography
thread-safe singleton in c++
Chicken chicken chicken chicken chicken chicken chicken chicken chicken chicken chicken